Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and apparatus implementing remote access control based on portable memory apparatus

A portable storage and remote access technology, applied in the field of remote access control, can solve problems such as heavy burden on application servers, attacks, and increased risk of application servers, and achieve the effect of reducing authentication burden and preventing authentication blocking

Inactive Publication Date: 2009-01-07
POTEVIO INFORMATION TECH
View PDF0 Cites 38 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] When the user accesses the network, the smart memory card directly authenticates with the application service on the network side. After the authentication is passed, the application server provides services to the smart memory card. Since the application server provides both the login process and the service to the workstation, the application The server is overloaded, causing users to log in for too long
Moreover, when multiple users log in at the same time, the application server's authentication of multiple users will increase the burden on the application server. At this time, the application server may also undertake some application services of other smart memory cards that have passed the authentication.
Not only that, but the application server direct authentication method also increases the danger of the application server, which may lead to many attacks directly targeting the application server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus implementing remote access control based on portable memory apparatus
  • Method and apparatus implementing remote access control based on portable memory apparatus
  • Method and apparatus implementing remote access control based on portable memory apparatus

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0040] see figure 1 , which is a flowchart example 1 of a method for realizing remote access control based on a portable storage device in the present invention, including the following steps:

[0041] Step 101, the smart memory card sends an access request message to the AS.

[0042] When the user wants to log in to the workstation to request the application server to provide services, he inserts the smart memory card into the workstation and enters the PIN for starting the smart memory card. After the smart memory card is started, it sends an access request message to the AS. Here, for simplicity of description, C represents the smart memory card, and V represents the application server.

[0043] The access request message includes the ID of the smart memory card (ID C ), the identification of the application server to be accessed by the smart memory card (ID V ) and the PC corresponding to the self-identification stored in the smart memory card. PC can be a long passwor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a device for realizing remote access control based on a portable storage device, the method comprises that: an authentication server receives a request access message which is sent by an intelligent storage card, and the request access message comprises an identifier of the intelligent storage card, the identifier of an application server and an identifier related key; the authentication server obtains the stored identifier related key which is corresponding to the identifier of the intelligent storage card and compares with the identifier related key in the request access message, if the two are consistent, a request access response message is returned to the intelligent storage card; the application server receives a service request message which contains the identifier of the intelligent storage card and a note and is sent by the intelligent storage card, a key decryption note which is shared with the authentication server is adopted for verifying the consistency of the identifier of the intelligent storage card which is contained in the note and the identifier of he intelligent storage card which is not encrypted in the service request message, thereby providing the service for the intelligent storage card. The proposal of the invention can realize the separation of the authentication and the application, thereby alleviating the burden on the application server for carrying out the authentication of the intelligent storage card.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and device for realizing remote access control based on a portable storage device. Background technique [0002] The Internet provides organizations and individuals the ability to use computers to communicate and share data worldwide, with benefits such as accessibility, scalability, and reduced business-related costs. However, the Internet is an insecure and potentially dangerous operating environment for organizations, and as such, organizations need to maintain the necessary level of data and communication security while taking advantage of the benefits the Internet offers. [0003] At present, the method for ensuring security is: when a user logs in to a remote network, two secrets, the user name and the password, are used for authentication, and the login succeeds after the authentication is passed. However, this method is insecure, and the third party...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32
Inventor 刘道斌李必涛
Owner POTEVIO INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products